首页> 外文期刊>Concurrency and computation: practice and experience >Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
【24h】

Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system

机译:检测传感器云系统中隐藏数据攻击组合的雾计算和信任评估方法

获取原文
获取原文并翻译 | 示例

摘要

With the popularity of Sensor-Cloud, its security issues get more attention from industry and academia. Especially, Sensor-Cloud underlying network is very vulnerable to internal attacks due to its limitations in computing, storage, and analysis. Most existing trust evaluation mechanisms are proposed to detect internal attack issues from the behavior level. However, there are some special internal attacks in the data level such as hidden data attacks, which are normal in the behavior level but generate malicious data to lead user to make wrong decisions. To detect this type of attacks, we design a fog-based detection system (FDS), which is based on the trust evaluation mechanism in the behavior level. In this paper, three types of scenes (the redundant data, the parameter curve characteristic, and the data validation) are defined, and three detection schemes are given. Some experiments are conducted, which manifest that FDS has certain advantages in detecting hidden data attacks.
机译:随着传感器云的普及,其安全问题得到了行业和学术界的更多关注。特别是,由于其在计算,存储和分析中的局限性,传感器云底层网络非常容易受到内部攻击。建议大多数现有的信任评估机制从行为级别检测内部攻击问题。但是,数据级别存在一些特殊的内部攻击,例如隐藏数据攻击,在行为级别中是正常的,但生成恶意数据以引导用户做出错误的决策。为了检测这种类型的攻击,我们设计了一种基于迷雾的检测系统(FDS),其基于行为级别的信任评估机制。在本文中,定义了三种类型的场景(冗余数据,参数曲线特性和数据验证),并给出了三​​种检测方案。进行了一些实验,这表明FDS在检测隐藏数据攻击方面具有一定的优势。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号